TY - JOUR
T1 - Securely computing three-input functions with eight cards
AU - Nishida, Takuya
AU - Hayashi, Yu Ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Publisher Copyright:
© 2015 The Institute of Electronics, Information and Communication Engineers.
PY - 2015/6/1
Y1 - 2015/6/1
N2 - Assume that Alice, Bob, and Carol, each of whom privately holds a one-bit input, want to learn the output of some Boolean function, say the majority function, of their inputs without revealing more of their own secret inputs than necessary. In this paper, we show that such a secure three-input function evaluation can be performed with a deck of real cards; specifically, the three players can learn only the output of the function using eight physical cards - four black and four red cards - with identical backs.
AB - Assume that Alice, Bob, and Carol, each of whom privately holds a one-bit input, want to learn the output of some Boolean function, say the majority function, of their inputs without revealing more of their own secret inputs than necessary. In this paper, we show that such a secure three-input function evaluation can be performed with a deck of real cards; specifically, the three players can learn only the output of the function using eight physical cards - four black and four red cards - with identical backs.
KW - Card games
KW - Card-based protocols
KW - Cryptography without computers
KW - Secure computations
UR - http://www.scopus.com/inward/record.url?scp=84930470051&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84930470051&partnerID=8YFLogxK
U2 - 10.1587/transfun.E98.A.1145
DO - 10.1587/transfun.E98.A.1145
M3 - Article
AN - SCOPUS:84930470051
SN - 0916-8508
VL - E98A
SP - 1145
EP - 1152
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 6
ER -